/Linux-v6.1/Documentation/admin-guide/sysctl/ |
D | user.rst | 2 Documentation for /proc/sys/user/ 12 /proc/sys/user. 16 per user per user namespace limits. 24 The creation of per user per user namespace objects are charged to 25 the user in the user namespace who created the object and 26 verified to be below the per user limit in that user namespace. 29 who created user namespaces the creation of the object happens 30 in (user namespaces can be nested) and verified to be below the per user 31 limits in the user namespaces of those users. 34 user namespace does not allow a user to escape their current limits. [all …]
|
/Linux-v6.1/fs/ksmbd/mgmt/ |
D | user_config.c | 15 struct ksmbd_user *user = NULL; in ksmbd_login_user() local 24 user = ksmbd_alloc_user(resp); in ksmbd_login_user() 27 return user; in ksmbd_login_user() 32 struct ksmbd_user *user = NULL; in ksmbd_alloc_user() local 34 user = kmalloc(sizeof(struct ksmbd_user), GFP_KERNEL); in ksmbd_alloc_user() 35 if (!user) in ksmbd_alloc_user() 38 user->name = kstrdup(resp->account, GFP_KERNEL); in ksmbd_alloc_user() 39 user->flags = resp->status; in ksmbd_alloc_user() 40 user->gid = resp->gid; in ksmbd_alloc_user() 41 user->uid = resp->uid; in ksmbd_alloc_user() [all …]
|
D | user_config.h | 24 static inline bool user_guest(struct ksmbd_user *user) in user_guest() argument 26 return user->flags & KSMBD_USER_FLAG_GUEST_ACCOUNT; in user_guest() 29 static inline void set_user_flag(struct ksmbd_user *user, int flag) in set_user_flag() argument 31 user->flags |= flag; in set_user_flag() 34 static inline int test_user_flag(struct ksmbd_user *user, int flag) in test_user_flag() argument 36 return user->flags & flag; in test_user_flag() 39 static inline void set_user_guest(struct ksmbd_user *user) in set_user_guest() argument 43 static inline char *user_passkey(struct ksmbd_user *user) in user_passkey() argument 45 return user->passkey; in user_passkey() 48 static inline char *user_name(struct ksmbd_user *user) in user_name() argument [all …]
|
/Linux-v6.1/kernel/trace/ |
D | trace_events_user.c | 38 * Limits how many trace_event calls user processes can create: 59 * status of the event wanting tracing or not to user-programs via shared 69 * probes to print out to the user. 71 * These do not reflect the mapped bytes between the user and kernel space. 80 * matching page for status checks within user programs. This 81 * allows for isolation of events to user programs by various 146 typedef void (*user_event_func_t) (struct user_event *user, struct iov_iter *i, 275 void user_event_register_set(struct user_event *user) in user_event_register_set() argument 277 int i = user->index; in user_event_register_set() 279 user->group->register_page_data[MAP_STATUS_BYTE(i)] |= MAP_STATUS_MASK(i); in user_event_register_set() [all …]
|
/Linux-v6.1/arch/arm64/kernel/ |
D | signal.c | 68 static void init_user_layout(struct rt_sigframe_user_layout *user) in init_user_layout() argument 71 sizeof(user->sigframe->uc.uc_mcontext.__reserved); in init_user_layout() 73 memset(user, 0, sizeof(*user)); in init_user_layout() 74 user->size = offsetof(struct rt_sigframe, uc.uc_mcontext.__reserved); in init_user_layout() 76 user->limit = user->size + reserved_size; in init_user_layout() 78 user->limit -= TERMINATOR_SIZE; in init_user_layout() 79 user->limit -= EXTRA_CONTEXT_SIZE; in init_user_layout() 83 static size_t sigframe_size(struct rt_sigframe_user_layout const *user) in sigframe_size() argument 85 return round_up(max(user->size, sizeof(struct rt_sigframe)), 16); in sigframe_size() 96 static int __sigframe_alloc(struct rt_sigframe_user_layout *user, in __sigframe_alloc() argument [all …]
|
/Linux-v6.1/drivers/mtd/nand/raw/atmel/ |
D | pmecc.c | 346 struct atmel_pmecc_user *user; in atmel_pmecc_create_user() local 354 size = sizeof(*user); in atmel_pmecc_create_user() 365 user = kzalloc(size, GFP_KERNEL); in atmel_pmecc_create_user() 366 if (!user) in atmel_pmecc_create_user() 369 user->pmecc = pmecc; in atmel_pmecc_create_user() 371 user->partial_syn = (s16 *)PTR_ALIGN(user + 1, sizeof(u16)); in atmel_pmecc_create_user() 372 user->si = user->partial_syn + ((2 * req->ecc.strength) + 1); in atmel_pmecc_create_user() 373 user->lmu = user->si + ((2 * req->ecc.strength) + 1); in atmel_pmecc_create_user() 374 user->smu = user->lmu + (req->ecc.strength + 1); in atmel_pmecc_create_user() 375 user->mu = (s32 *)PTR_ALIGN(user->smu + in atmel_pmecc_create_user() [all …]
|
/Linux-v6.1/arch/arm/mach-omap2/ |
D | omap_hwmod_2xxx_interconnect_data.c | 28 .user = OCP_USER_MPU | OCP_USER_SDMA, 35 .user = OCP_USER_MPU, 48 .user = OCP_USER_MPU | OCP_USER_SDMA, 55 .user = OCP_USER_MPU | OCP_USER_SDMA, 63 .user = OCP_USER_MPU | OCP_USER_SDMA, 71 .user = OCP_USER_MPU | OCP_USER_SDMA, 79 .user = OCP_USER_MPU | OCP_USER_SDMA, 87 .user = OCP_USER_MPU | OCP_USER_SDMA, 95 .user = OCP_USER_MPU | OCP_USER_SDMA, 103 .user = OCP_USER_MPU | OCP_USER_SDMA, [all …]
|
/Linux-v6.1/drivers/virt/acrn/ |
D | hypercall.h | 64 * hcall_create_vm() - Create a User VM 65 * @vminfo: Service VM GPA of info of User VM creation 75 * hcall_start_vm() - Start a User VM 76 * @vmid: User VM ID 86 * hcall_pause_vm() - Pause a User VM 87 * @vmid: User VM ID 97 * hcall_destroy_vm() - Destroy a User VM 98 * @vmid: User VM ID 108 * hcall_reset_vm() - Reset a User VM 109 * @vmid: User VM ID [all …]
|
/Linux-v6.1/Documentation/powerpc/ |
D | cxlflash.rst | 24 CXL provides a mechanism by which user space applications can 27 user space application direct access to Flash storage. 33 special path for user space access, and performing error recovery. It 44 user space with a special block library. This mode further 59 directly in each user I/O, but at the minimum is involved in the 60 initial setup before the user application is allowed to send requests 68 | 512 * 64 KB User MMIO | 70 | User Accessible | 90 access to the Flash from user space (without requiring a system call). 93 block library to enable this user space access. The driver supports [all …]
|
/Linux-v6.1/arch/powerpc/include/asm/ |
D | reg_fsl_emb.h | 36 #define PMLCA_FCU 0x20000000 /* Freeze in User */ 67 #define PMRN_UPMC0 0x000 /* User Performance Monitor Counter 0 */ 68 #define PMRN_UPMC1 0x001 /* User Performance Monitor Counter 1 */ 69 #define PMRN_UPMC2 0x002 /* User Performance Monitor Counter 2 */ 70 #define PMRN_UPMC3 0x003 /* User Performance Monitor Counter 3 */ 71 #define PMRN_UPMC4 0x004 /* User Performance Monitor Counter 4 */ 72 #define PMRN_UPMC5 0x005 /* User Performance Monitor Counter 5 */ 73 #define PMRN_UPMLCA0 0x080 /* User PM Local Control A0 */ 74 #define PMRN_UPMLCA1 0x081 /* User PM Local Control A1 */ 75 #define PMRN_UPMLCA2 0x082 /* User PM Local Control A2 */ [all …]
|
/Linux-v6.1/scripts/ |
D | Makefile.userprogs | 7 user-csingle := $(foreach m, $(userprogs), $(if $($(m)-objs),,$(m))) 10 user-cmulti := $(foreach m, $(userprogs), $(if $($(m)-objs),$(m))) 13 user-cobjs := $(sort $(foreach m, $(userprogs), $($(m)-objs))) 15 user-csingle := $(addprefix $(obj)/, $(user-csingle)) 16 user-cmulti := $(addprefix $(obj)/, $(user-cmulti)) 17 user-cobjs := $(addprefix $(obj)/, $(user-cobjs)) 27 $(user-csingle): $(obj)/%: $(src)/%.c FORCE 35 $(user-cmulti): FORCE 37 $(call multi_depend, $(user-cmulti), , -objs) 42 $(user-cobjs): $(obj)/%.o: $(src)/%.c FORCE [all …]
|
/Linux-v6.1/Documentation/admin-guide/LSM/ |
D | SafeSetID.rst | 8 allowing a user to set up user namespace UID/GID mappings. 14 to switch to a different user must be spawned with CAP_SETUID privileges. 16 user that have been explicitly given the CAP_SETUID runtime capability. It is 19 privileges opens up possible security holes since any user with access to the 24 tree of processes under non-root user(s) in the first place. Specifically, 25 since CAP_SETUID allows changing to any user on the system, including the root 26 user, it is an overpowered capability for what is needed in this scenario, 28 lesser-privileged user -- not elevate privileges. Unfortunately, there is no 29 generally feasible way in Linux to restrict the potential UIDs that a user can 30 switch to through setuid() beyond allowing a switch to any user on the system. [all …]
|
/Linux-v6.1/arch/m68k/ifpsp060/ |
D | os.S | 57 | Each IO routine checks to see if the memory write/read is to/from user 60 | for user mode applications. 71 | working in user space 80 | a1 - user destination address 82 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode 110 | a0 - user source address 113 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode 140 | Read a data byte from user memory. 143 | a0 - user source address 144 | 0x4(%a6),bit5 - 1 = supervisor mode, 0 = user mode [all …]
|
/Linux-v6.1/include/linux/ |
D | ipmi.h | 27 * Opaque type for a IPMI message user. One of these is needed to 48 struct ipmi_user *user; member 57 * be NULL. If the user above is NULL, then this will be the 96 * this is NULL, it will be ignored for the user. 108 * the user handle will be invalid. The interface may or may 115 /* Create a new user of the IPMI layer on the given interface number. */ 119 struct ipmi_user **user); 122 * Destroy the given user of the IPMI layer. Note that after this 124 * callbacks for the user. Thus as long as you destroy all the users 129 int ipmi_destroy_user(struct ipmi_user *user); [all …]
|
/Linux-v6.1/Documentation/arm/ |
D | sunxi.rst | 26 * User Manual 28 …http://dl.linux-sunxi.org/A10/A10%20User%20Manual%20-%20v1.20%20%282012-04-09%2c%20DECRYPTED%29.pdf 41 * User Manual 43 http://dl.linux-sunxi.org/A13/A13%20User%20Manual%20-%20v1.2%20%282013-01-08%29.pdf 57 * User Manual 59 http://dl.linux-sunxi.org/A20/A20%20User%20Manual%202013-03-22.pdf 67 * User Manual 69 http://dl.linux-sunxi.org/A23/A23%20User%20Manual%20V1.0%2020130830.pdf 78 * User Manual 80 …http://dl.linux-sunxi.org/A31/A3x_release_document/A31/IC/A31%20user%20manual%20V1.1%2020130630.pdf [all …]
|
/Linux-v6.1/Documentation/misc-devices/ |
D | uacce.rst | 6 Uacce (Unified/User-space-access-intended Accelerator Framework) targets to 11 Because of the unified address, hardware and user space of process can 21 | User application (CPU) | | Hardware Accelerator | 45 The user drivers and libraries are called WarpDrive. 57 | | user API | | 58 | WarpDrive library | ------------> | user driver | 93 created when user application open the chrdev. The file descriptor is used 94 as the user handle of the queue. 96 a chrdev to the user space. The user application communicates with the 109 * @UACCE_QFRT_DUS: device user share region [all …]
|
/Linux-v6.1/Documentation/trace/ |
D | user_events.rst | 2 user_events: User-based Event Tracing 9 User based trace events allow user processes to create events and trace data 18 delete user based events via the u: prefix. The format of the command to 37 Registering within a user process is done via ioctl() out to the 55 User based events show up under tracefs like any other event under the 79 User programs are encouraged to use clearly sized types like u32. 81 **NOTE:** *Long is not supported since size can vary between user and kernel.* 84 This allows user programs to describe custom structs out to tools, if required. 98 Deleting an event from within a user process is done via ioctl() out to the 104 event (in both user and kernel space). User programs should use a separate file [all …]
|
/Linux-v6.1/drivers/fsi/ |
D | fsi-sbefifo.c | 780 static void sbefifo_release_command(struct sbefifo_user *user) in sbefifo_release_command() argument 782 if (is_vmalloc_addr(user->pending_cmd)) in sbefifo_release_command() 783 vfree(user->pending_cmd); in sbefifo_release_command() 784 user->pending_cmd = NULL; in sbefifo_release_command() 785 user->pending_len = 0; in sbefifo_release_command() 791 struct sbefifo_user *user; in sbefifo_user_open() local 793 user = kzalloc(sizeof(struct sbefifo_user), GFP_KERNEL); in sbefifo_user_open() 794 if (!user) in sbefifo_user_open() 797 file->private_data = user; in sbefifo_user_open() 798 user->sbefifo = sbefifo; in sbefifo_user_open() [all …]
|
/Linux-v6.1/drivers/staging/greybus/Documentation/firmware/ |
D | firmware-management | 57 and user first needs to identify the character device used for 61 be used by the user to identify the right character device for it. The class 80 Following are the IOCTLs and their data structures available to the user: 142 This ioctl shall be used by the user to get the version and firmware-tag of 148 This ioctl shall be used by the user to get the version of a currently 149 running Backend Interface Firmware identified by a firmware-tag. The user is 156 This ioctl shall be used by the user to load an Interface Firmware package on 157 an Interface. The user needs to fill the 'firmware_tag' and 'load_method' 163 This ioctl shall be used by the user to request an Interface to update a 164 Backend Interface Firmware. The user is required to fill the 'firmware_tag' [all …]
|
/Linux-v6.1/arch/loongarch/include/asm/ |
D | uaccess.h | 28 * get_user: - Get a simple variable from user space. 30 * @ptr: Source address, in user space. 32 * Context: User context only. This function may sleep if pagefaults are 35 * This macro copies a single simple variable from user space to kernel 55 * put_user: - Write a simple value into user space. 56 * @x: Value to copy to user space. 57 * @ptr: Destination address, in user space. 59 * Context: User context only. This function may sleep if pagefaults are 62 * This macro copies a single simple value from kernel space to user 80 * __get_user: - Get a simple variable from user space, with less checking. [all …]
|
/Linux-v6.1/Documentation/ABI/testing/ |
D | debugfs-driver-habanalabs | 42 Description: Allows the root user to read or write directly through the 46 the generic Linux user-space PCI mapping) because the DDR bar 50 If the IOMMU is disabled, it also allows the root user to read 57 Description: Allows the root user to read or write 64 bit data directly 61 the generic Linux user-space PCI mapping) because the DDR bar 65 If the IOMMU is disabled, it also allows the root user to read 72 Description: Allows the root user to read from the device's internal 77 Linux user-space PCI mapping) because the amount of internal 82 in case the it is done while the device is executing user 90 Description: Enables the root user to set the device to specific state. [all …]
|
/Linux-v6.1/arch/powerpc/include/asm/nohash/32/ |
D | mmu-44x.h | 36 #define PPC44x_TLB_U0 0x00008000 /* User 0 */ 37 #define PPC44x_TLB_U1 0x00004000 /* User 1 */ 38 #define PPC44x_TLB_U2 0x00002000 /* User 2 */ 39 #define PPC44x_TLB_U3 0x00001000 /* User 3 */ 47 #define PPC44x_TLB_UX 0x00000020 /* User execution */ 48 #define PPC44x_TLB_UW 0x00000010 /* User write */ 49 #define PPC44x_TLB_UR 0x00000008 /* User read */ 82 #define PPC47x_TLB2_U0 0x00008000 /* User 0 */ 83 #define PPC47x_TLB2_U1 0x00004000 /* User 1 */ 84 #define PPC47x_TLB2_U2 0x00002000 /* User 2 */ [all …]
|
/Linux-v6.1/drivers/gpu/drm/nouveau/nvkm/engine/disp/ |
D | chan.c | 34 u64 size, base = chan->func->user(chan, &size); in nvkm_disp_chan_rd32() 45 u64 size, base = chan->func->user(chan, &size); in nvkm_disp_chan_wr32() 77 *addr = base + chan->func->user(chan, size); in nvkm_disp_chan_map() 178 if (disp->chan[chan->chid.user] == chan) in nvkm_disp_chan_dtor() 179 disp->chan[chan->chid.user] = NULL; in nvkm_disp_chan_dtor() 202 const struct nvkm_disp_chan_user *user = NULL; in nvkm_disp_chan_new_() local 207 for (i = 0; disp->func->user[i].ctor; i++) { in nvkm_disp_chan_new_() 208 if (disp->func->user[i].base.oclass == oclass->base.oclass) { in nvkm_disp_chan_new_() 209 user = disp->func->user[i].chan; in nvkm_disp_chan_new_() 214 if (WARN_ON(!user)) in nvkm_disp_chan_new_() [all …]
|
/Linux-v6.1/security/keys/ |
D | key.c | 48 * Get the key quota record for a user, allocating a new record if one doesn't 53 struct key_user *candidate = NULL, *user; in key_user_lookup() local 61 /* search the tree for a user record with a matching UID */ in key_user_lookup() 64 user = rb_entry(parent, struct key_user, node); in key_user_lookup() 66 if (uid_lt(uid, user->uid)) in key_user_lookup() 68 else if (uid_gt(uid, user->uid)) in key_user_lookup() 76 /* allocate a candidate user record if we don't already have in key_user_lookup() 80 user = NULL; in key_user_lookup() 91 /* if we get here, then the user record still hadn't appeared on the in key_user_lookup() 105 user = candidate; in key_user_lookup() [all …]
|
/Linux-v6.1/drivers/char/ipmi/ |
D | ipmi_msghandler.c | 154 /* The default maximum number of message a user may have outstanding. */ 158 "The most message a user may have outstanding."); 178 * The main "user" data structure. 184 * Set to NULL when the user is destroyed, a pointer to myself 196 /* The interface this user is bound to. */ 210 static struct ipmi_user *acquire_ipmi_user(struct ipmi_user *user, int *index) in acquire_ipmi_user() argument 211 __acquires(user->release_barrier) in acquire_ipmi_user() 215 *index = srcu_read_lock(&user->release_barrier); in acquire_ipmi_user() 216 ruser = srcu_dereference(user->self, &user->release_barrier); in acquire_ipmi_user() 218 srcu_read_unlock(&user->release_barrier, *index); in acquire_ipmi_user() [all …]
|